The AI Gold Rush: Ensuring Security in South Africa's Business Landscape
This article has been supplied.
By Kate Mollett, Senior Director at Commvault Africa
The business world has also been caught up in the Artificial Intelligence (AI) fever, with discussions taking place in boardrooms and C-suites about how to leverage AI tools. Employees in many companies are downloading AI apps to explore their potential for enhancing mundane tasks, while in-house developers are actively seeking new data libraries to build around.
Secure Adoption in the Race for AI Integration
Responding to the market frenzy, business software vendors, from major players to niche vendors, are racing to introduce AI-based tools and features. According to IDC, enterprise spending on AI is projected to increase by 27% this year to reach $154 billion. With prudent planning and a focus on cybersecurity, organisations can confidently embrace the transformative power of AI in the business landscape.
However, organisations need to proceed with caution. The rush to adopt AI technology may lead companies to overlook critical security measures, leaving them vulnerable to devastating hacks. Many of the new AI tools are based on open-source infrastructure or data repositories, which necessitate a different defensive strategy from the proprietary tools used in the past. It is crucial for CIOs, CISOs, and other tech leaders within organisations to establish a process that allows security professionals to validate the libraries or platforms on which AI programs are based.
Safeguarding Against Open-Source Vulnerabilities
Open source, although a powerful tool, comes with its risks. South Africa, like many other regions, has witnessed instances of bad actors targeting open platforms. The SolarWinds hack serves as an example of the damage that can be caused by Information Technology (IT) supply chain breaches when thousands of data networks were compromised. Hence, the widespread adoption of open AI platforms by enterprises increases the potential for catastrophic IT supply chain breaches.
Fortunately, there are steps that security leaders can take to continuously evaluate open-source tools for vulnerabilities. Businesses must conduct thorough research on potential vendors providing IT services to the enterprise. Additionally, security teams should collaborate closely with development teams to assess the security protocols employed to safeguard open-source libraries. Once the in-house IT team confirms the security of repositories, they can establish access guidelines that enable employees to download preferred apps or utilise specific libraries to power machine learning algorithms. However, caution should still be exercised.
Evaluating and Monitoring AI Software
Both employees and security professionals need to evaluate the value that software brings against potential threats. Vendor scorecards can assist in assessing potential risks. Benchmarking IT providers against one another helps enterprises make informed decisions about which vendors to engage. Questions about development methodologies, code analysis, dynamic scanning capabilities, vulnerability remediation processes, and understanding the impact of supply chain hacks should be documented.
Once a vendor is deemed trustworthy, the responsibility does not end there. As more open-source tools are deployed, security teams must continuously monitor applications for unknown code or security breaches. AI can aid in this process by automating daily monitoring tasks, allowing analysts to focus on protecting next-generation AI software.
To stay ahead in the rapidly evolving AI landscape, businesses must prioritise robust security measures, including thorough vendor vetting and continuous monitoring of AI applications. By striking a balance between innovation and risk management, organisations can harness the power of AI while safeguarding their valuable data and systems. Embracing AI with caution and a proactive security mindset will enable businesses to navigate the AI gold rush with confidence and resilience.
Comments
Press Office
Announcements
What's On
Subscribe to improve your user experience...
Option 1 (equivalent of R125 a month):
Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format
Option 2 (equivalent of R375 a month):
All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors
including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.
Already a subscriber?
Forgotten your password?
Receive weekly copy of Creamer Media's Engineering News & Mining Weekly magazine (print copy for those in South Africa and e-magazine for those outside of South Africa)
➕
Recieve daily email newsletters
➕
Access to full search results
➕
Access archive of magazine back copies
➕
Access to Projects in Progress
➕
Access to ONE Research Report of your choice in PDF format
RESEARCH CHANNEL AFRICA
R4500 (equivalent of R375 a month)
SUBSCRIBEAll benefits from Option 1
➕
Access to Creamer Media's Research Channel Africa for ALL Research Reports on various industrial and mining sectors, in PDF format, including on:
Electricity
➕
Water
➕
Energy Transition
➕
Hydrogen
➕
Roads, Rail and Ports
➕
Coal
➕
Gold
➕
Platinum
➕
Battery Metals
➕
etc.
Receive all benefits from Option 1 or Option 2 delivered to numerous people at your company
➕
Multiple User names and Passwords for simultaneous log-ins
➕
Intranet integration access to all in your organisation